The connected world is going through a transformation in its approach to cyber. Many organzations agree that network providers must provide more cost effective security controls as a means to break the hardware security-spend cycle.